Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
Source
| ACM Transactions on Computing… | 2 |
Author
| Archer, Ricky | 1 |
| Lukowiak, Marcin | 1 |
| Qadah, Yaseen | 1 |
| Radziszowski, Stanislaw | 1 |
| Vallino, James | 1 |
| Vega, Percy | 1 |
| Wood, Christopher | 1 |
| Xu, Jinsheng | 1 |
| Yu, Huiming | 1 |
| Yuan, Xiaohong | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 1 |
| Reports - Research | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
Audience
Location
| New York | 1 |
| North Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher – ACM Transactions on Computing Education, 2014
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
Descriptors: Computer Security, Computers, Computer Software, Computer Science Education
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study

Peer reviewed
Direct link
